Seminar on Internet Technologies (Winter 2010/2011): Difference between revisions

 
(32 intermediate revisions by 4 users not shown)
Line 9: Line 9:
}}
}}


{{Announcement|'''Don't forget to register with FlexNow!''' The final FlexNow registration deadline is 7 January 2011.}}
{{Announcement|Please register your topic with the corresponding topic supervisor and '''your preferred date for the presentation''' as soon as possible. We will cancel the presentations on 16 December 2010 if not at least two students register for this date before 30 November 2010.}}
{{Announcement|You can participate in the seminar even if you were not present at the informational meeting (please contact [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann] for future information).}}


==Course description==
==Course description==
Line 25: Line 28:


==Schedule==
==Schedule==
TBA
* Thursday, '''4 November 2010, 16.15 - 17.00''': First general meeting. Introduction to the course and open questions.
* CANCELED - Thursday, '''6 January 2011, 15.00 - 18.00''': Presentations
** CANCELED!
** <strike>Automated Security Protocol Analysis (AVANTSSAR)</strike> <span style="color:#B22222">(canceled)</span>
* Thursday, '''13 January 2011, 15.00 - 18.00''': Presentations
** Scalable Server Selection for Cloud Services
** Matrix Factorization Model based Network Coordinate System
** A conceptual overview of mobile platforms
** Android programming: Concepts and limitations
* Thursday, '''20 January 2011, 15.00 - 18.00''': Presentations
** Mobile and Wireless Peer-to-Peer Systems
** Fighting Spam in Social Networking Sites
** Modern Authentication Systems on the example of MS Geneva <span style="color:#B22222">(shifted from 6th of January)</span>
** Distributed Hash Tables - Usage, properties and future development <span style="color:#B22222">(shifted from 6th of January)</span>


== Topics ==
== Topics ==
Line 53: Line 69:
| [http://www.linkedin.com/]
| [http://www.linkedin.com/]
|-
|-
| Traffic Localization in P2P Networks
| <strike>Traffic Localization in P2P Networks</strike>
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://www.net.informatik.uni-goettingen.de/people/niklas_neumann Niklas Neumann]
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]
| [http://tools.ietf.org/html/draft-marocco-alto-problem-statement] [http://tools.ietf.org/html/draft-marocco-p2prg-mythbustering]
|-
|-
| Modern Authentication Systems on the example of MS Geneva
| <strike>Modern Authentication Systems on the example of MS Geneva</strike>
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]
| [http://msdn.microsoft.com/de-de/magazine/dd278426.aspx]
|-
|-
| Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)
| <strike>Automated Security Protocol Analysis (choose an example from CasperFDR, Isabelle, Avispa)</strike>
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://avispa-project.org/]
| [http://avispa-project.org/]
|-
|-
| Distributed Hash Tables - Usage, properties and future development
| <strike>Distributed Hash Tables - Usage, properties and future development</strike>
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://www.net.informatik.uni-goettingen.de/people/florian_tegeler Florian Tegeler]
| [http://en.wikipedia.org/wiki/Distributed_hash_table]
| [http://en.wikipedia.org/wiki/Distributed_hash_table]
|-
|-
| Matrix Factorization Model based Network Coordinate System
| <strike>Matrix Factorization Model based Network Coordinate System</strike>
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf]
| [http://www.net-glyph.org/~chenyang/NC/ides_jsac06.pdf] [http://www.net-glyph.org/~chenyang/Networking09_Phoenix.pdf] [http://user.informatik.uni-goettingen.de/~ychen/NC/DMF_Networking10.pdf]
Line 81: Line 97:
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&rep=rep1&type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&type=pdf&coll=GUIDE&dl=GUIDE&CFID=108242768&CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&rep=rep1&type=pdf]
| [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.75.9303&rep=rep1&type=pdf] [http://portal.acm.org/ft_gateway.cfm?id=1378626&type=pdf&coll=GUIDE&dl=GUIDE&CFID=108242768&CFTOKEN=61684608] [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.5797&rep=rep1&type=pdf]
|-
|-
| Fighting Spam in Social Networking Sites
| <strike>Fighting Spam in Social Networking Sites</strike>
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.net.informatik.uni-goettingen.de/people/sufian_hameed Sufian Hameed]
| [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125]
| [http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2007.125]
|-
|-
| Security Design in Network Coordinate Systems
| <strike>Security Design in Network Coordinate Systems</strike>
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]
Line 93: Line 109:
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_tax.pdf] [http://www.cs.ust.hk/mjg_lib/Library/0310039.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/econ_wu.pdf]
|-
|-
| Mobile and Wireless Peer-to-Peer Systems
| <strike>Mobile and Wireless Peer-to-Peer Systems</strike>
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf]
| [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_p2p.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf] [http://cs.nju.edu.cn/dislab/xuty/readinglist/wireless_jsac.pdf]
|-
|-
| Cloud Computing
| <strike>Scalable Server Selection for Cloud Services</strike>
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://portal.acm.org/citation.cfm?id=1721672] [http://ccr.sigcomm.org/online/?q=node/654] [http://www.cs.rice.edu/~gw4314/papers/infocom10.pdf] [http://aws.amazon.com/ec2/]
| [http://portal.acm.org/citation.cfm?id=1721672] [http://ccr.sigcomm.org/online/?q=node/654] [ftp://ftp.cs.princeton.edu/techreports/2009/868.pdf]
|}
|}